Managing NFS and NIS, 2nd Edition - Mike Eisler [279]
7.4.2. Client data caching
7.4.3. Server-side caching
7.5. File locking
7.5.1. Lock and status daemons
7.5.2. Client lock recovery
7.5.3. Recreating state information
7.6. NFS futures
7.6.1. NFS Version 4
7.6.2. Security
8. Diskless Clients
8.1. NFS support for diskless clients
8.2. Setting up a diskless client
8.3. Diskless client boot process
8.3.1. Reverse ARP requests
8.3.2. Getting a boot block
8.3.3. Booting a kernel
8.3.4. Managing boot parameters
8.4. Managing client swap space
8.5. Changing a client's name
8.6. Troubleshooting
8.6.1. Missing and inconsistent client information
8.6.2. Checking boot parameters
8.6.3. Debugging rarpd and bootparamd
8.6.4. Missing /usr
8.7. Configuration options
8.7.1. Dataless clients
8.7.2. Swapping on a local disk
8.8. Brief introduction to JumpStart administration
8.9. Client/server ratios
9. The Automounter
9.1. Automounter maps
9.1.1. Indirect maps
9.1.2. Inside the automounter
9.1.3. Direct maps
9.2. Invocation and the master map
9.2.1. The master map
9.2.2. Command-line options
9.2.3. The null map
9.2.4. Tuning timeout values
9.3. Integration with NIS
9.3.1. Mixing NIS and files in the same map
9.3.2. Updating NIS-managed automount maps
9.4. Key and variable substitutions
9.4.1. Key substitutions
9.4.2. Variable substitutions
9.5. Advanced map tricks
9.5.1. Replicated servers
9.5.2. Hierarchical mounts
9.5.3. Conversion of direct maps
9.5.4. Multiple indirection
9.5.5. Executable indirect maps
9.6. Side effects
9.6.1. Long search paths
9.6.2. Avoiding automounted filesystems
10. PC/NFS Clients
10.1. PC/NFS today
10.2. Limitations of PC/NFS
10.2.1. NFS versus SMB (CIFS)
10.2.2. Why PC/NFS?
10.3. Configuring PC/NFS
10.3.1. Server-side PC/NFS configuration
10.4. Common PC/NFS usage issues
10.4.1. Mounting filesystems
10.4.2. Checking file permissions
10.4.3. Unix to Windows/NT text file conversion
10.5. Printer services
11. File Locking
11.1. What is file locking?
11.1.1. Exclusive and shared locks
11.1.2. Record locks
11.1.3. Mandatory versus advisory locking
11.1.4. Windows/NT locking scheme
11.2. NFS and file locking
11.2.1. The NLM protocol
11.2.2. NLM recovery
11.2.3. Mandatory locking and NFS
11.2.4. NFS and Windows lock semantics
11.3. Troubleshooting locking problems
11.3.1. Diagnosing NFS lock hangs
11.3.2. Examining lock state on NFS/NLM servers
11.3.3. Clearing lock state
12. Network Security
12.1. User-oriented network security
12.1.1. Trusted hosts and trusted users
12.1.2. Enabling transparent access
12.1.3. Using netgroups
12.2. How secure are NIS and NFS?
12.3. Password and NIS security
12.3.1. Managing the root password with NIS
12.3.2. Making NIS more secure
12.3.3. Unknown password entries
12.4. NFS security
12.4.1. RPC security
12.4.2. Superuser mapping
12.4.3. Unknown user mapping
12.4.4. Access to filesystems
12.4.5. Read-only access
12.4.6. Port monitoring
12.4.7. Using NFS through firewalls
12.4.8. Access control lists
12.5. Stronger security for NFS
12.5.1. Security services
12.5.2. Brief introduction to cryptography
12.5.3. NFS and IPSec
12.5.4. AUTH_DH: Diffie-Hellman authentication
12.5.5. RPCSEC_GSS: Generic security services for RPC
12.5.6. Planning a transition from NFS/sys to stronger NFS security
12.5.7. NFS security futures
12.6. Viruses
13. Network Diagnostic and Administrative Tools
13.1. Broadcast addresses
13.2. MAC and IP layer tools
13.2.1. ifconfig: interface configuration
13.2.2. Subnetwork masks
13.2.3. IP to MAC address mappings
13.2.4. Using ping to check network connectivity
13.2.5. Gauging Ethernet interface capacity
13.3. Remote procedure call